首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
Deep radio signal clustering with interpretability analysis based on saliency map 基于显著性图的具有可解释性分析的深度无线电信号聚类
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.01.010
Huaji Zhou , Jing Bai , Yiran Wang , Junjie Ren , Xiaoniu Yang , Licheng Jiao
With the development of information technology, radio communication technology has made rapid progress. Many radio signals that have appeared in space are difficult to classify without manually labeling. Unsupervised radio signal clustering methods have recently become an urgent need for this situation. Meanwhile, the high complexity of deep learning makes it difficult to understand the decision results of the clustering models, making it essential to conduct interpretable analysis. This paper proposed a combined loss function for unsupervised clustering based on autoencoder. The combined loss function includes reconstruction loss and deep clustering loss. Deep clustering loss is added based on reconstruction loss, which makes similar deep features converge more in feature space. In addition, a features visualization method for signal clustering was proposed to analyze the interpretability of autoencoder utilizing Saliency Map. Extensive experiments have been conducted on a modulated signal dataset, and the results indicate the superior performance of our proposed method over other clustering algorithms. In particular, for the simulated dataset containing six modulation modes, when the SNR is 20 ​dB, the clustering accuracy of the proposed method is greater than 78%. The interpretability analysis of the clustering model was performed to visualize the significant features of different modulated signals and verified the high separability of the features extracted by clustering model.
随着信息技术的发展,无线电通信技术也取得了突飞猛进的发展。太空中出现的许多无线电信号,如果不进行人工标注,就很难进行分类。针对这种情况,无监督无线电信号聚类方法成为近期的迫切需求。同时,深度学习的高复杂性使得聚类模型的决策结果难以理解,因此进行可解释性分析十分必要。本文提出了一种基于自动编码器的无监督聚类的组合损失函数。组合损失函数包括重建损失和深度聚类损失。深度聚类损失是在重构损失的基础上增加的,它能使相似的深度特征在特征空间中更加收敛。此外,还提出了一种信号聚类的特征可视化方法,利用 Saliency Map 分析自动编码器的可解释性。我们在一个调制信号数据集上进行了广泛的实验,结果表明我们提出的方法比其他聚类算法性能更优越。其中,对于包含六种调制模式的模拟数据集,当信噪比为 20 dB 时,建议方法的聚类准确率大于 78%。对聚类模型进行了可解释性分析,使不同调制信号的重要特征可视化,验证了聚类模型提取的特征具有很高的可分离性。
{"title":"Deep radio signal clustering with interpretability analysis based on saliency map","authors":"Huaji Zhou ,&nbsp;Jing Bai ,&nbsp;Yiran Wang ,&nbsp;Junjie Ren ,&nbsp;Xiaoniu Yang ,&nbsp;Licheng Jiao","doi":"10.1016/j.dcan.2023.01.010","DOIUrl":"10.1016/j.dcan.2023.01.010","url":null,"abstract":"<div><div>With the development of information technology, radio communication technology has made rapid progress. Many radio signals that have appeared in space are difficult to classify without manually labeling. Unsupervised radio signal clustering methods have recently become an urgent need for this situation. Meanwhile, the high complexity of deep learning makes it difficult to understand the decision results of the clustering models, making it essential to conduct interpretable analysis. This paper proposed a combined loss function for unsupervised clustering based on autoencoder. The combined loss function includes reconstruction loss and deep clustering loss. Deep clustering loss is added based on reconstruction loss, which makes similar deep features converge more in feature space. In addition, a features visualization method for signal clustering was proposed to analyze the interpretability of autoencoder utilizing Saliency Map. Extensive experiments have been conducted on a modulated signal dataset, and the results indicate the superior performance of our proposed method over other clustering algorithms. In particular, for the simulated dataset containing six modulation modes, when the SNR is 20 ​dB, the clustering accuracy of the proposed method is greater than 78%. The interpretability analysis of the clustering model was performed to visualize the significant features of different modulated signals and verified the high separability of the features extracted by clustering model.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1448-1458"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43183277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game-theoretic physical layer authentication for spoofing detection in internet of things 物联网中用于欺骗检测的博弈论物理层认证
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2022.12.016
Yue Wu, Tao Jing, Qinghe Gao, Yingzhen Wu, Yan Huo
The Internet of Things (IoT) has permeated various fields relevant to our lives. In these applications, countless IoT devices transmit vast amounts of data, which often carry important and private information. To prevent malicious users from spoofing these information, the first critical step is effective authentication. Physical Layer Authentication (PLA) employs unique characteristics inherent to wireless signals and physical devices and is promising in the IoT due to its flexibility, low complexity, and transparency to higher layer protocols. In this paper, the focus is on the interaction between multiple malicious spoofers and legitimate receivers in the PLA process. First, the interaction is formulated as a static spoof detection game by including the spoofers and receivers as players. The best authentication threshold of the receiver and the attack rate of the spoofers are consideblack as Nash Equilibrium (NE). Then, closed-form expressions are derived for all NEs in the static environment in three cases: multiplayer games, zero-sum games with collisions, and zero-sum games without collisions. Considering the dynamic environment, a Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm is proposed to analyze the interactions of receiver and spoofers. Last, comprehensive simulation experiments are conducted and demonstrate the impact of environmental parameters on the NEs, which provides guidance to design effective PLA schemes.
物联网(IoT)已经渗透到与我们生活相关的各个领域。在这些应用中,无数的物联网设备传输大量数据,这些数据往往包含重要的私人信息。为了防止恶意用户欺骗这些信息,有效的身份验证是关键的第一步。物理层身份验证(PLA)利用了无线信号和物理设备固有的独特特性,由于其灵活性、低复杂性以及对上层协议的透明性,在物联网领域大有可为。本文的重点是 PLA 过程中多个恶意欺骗者与合法接收者之间的交互。首先,通过将欺骗者和接收者作为博弈者,将互动制定为静态欺骗检测博弈。接收方的最佳认证阈值和欺骗者的攻击率被视为纳什均衡(Nash Equilibrium,NE)。然后,在静态环境中,在多人博弈、有碰撞的零和博弈和无碰撞的零和博弈这三种情况下,推导出了所有 NE 的闭式表达式。考虑到动态环境,提出了一种多代理深度确定性策略梯度(MADDPG)算法来分析接收者和欺骗者之间的相互作用。最后,进行了全面的仿真实验,证明了环境参数对近地网的影响,为设计有效的 PLA 方案提供了指导。
{"title":"Game-theoretic physical layer authentication for spoofing detection in internet of things","authors":"Yue Wu,&nbsp;Tao Jing,&nbsp;Qinghe Gao,&nbsp;Yingzhen Wu,&nbsp;Yan Huo","doi":"10.1016/j.dcan.2022.12.016","DOIUrl":"10.1016/j.dcan.2022.12.016","url":null,"abstract":"<div><div>The Internet of Things (IoT) has permeated various fields relevant to our lives. In these applications, countless IoT devices transmit vast amounts of data, which often carry important and private information. To prevent malicious users from spoofing these information, the first critical step is effective authentication. Physical Layer Authentication (PLA) employs unique characteristics inherent to wireless signals and physical devices and is promising in the IoT due to its flexibility, low complexity, and transparency to higher layer protocols. In this paper, the focus is on the interaction between multiple malicious spoofers and legitimate receivers in the PLA process. First, the interaction is formulated as a static spoof detection game by including the spoofers and receivers as players. The best authentication threshold of the receiver and the attack rate of the spoofers are consideblack as Nash Equilibrium (NE). Then, closed-form expressions are derived for all NEs in the static environment in three cases: multiplayer games, zero-sum games with collisions, and zero-sum games without collisions. Considering the dynamic environment, a Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm is proposed to analyze the interactions of receiver and spoofers. Last, comprehensive simulation experiments are conducted and demonstrate the impact of environmental parameters on the NEs, which provides guidance to design effective PLA schemes.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1394-1404"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49221548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems 在大规模多输入多输出系统中纳入非正交试验的分析框架
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2024.02.002
Navid Pourjafari, Jalil Seifali Harsini
Training-based cellular communication systems use orthogonal pilot sequences to limit pilot contamination. However, the orthogonality constraint imposes a certain pilot length, and therefore, in communication systems with a large number of users, time-frequency resources are wasted significantly in the training phase. In cellular massive MIMO systems, the time-frequency resources can be used more efficiently by replacing the orthogonal pilots with shorter non-orthogonal pilot sequences in such a way that more space is available for the transmission of additional data symbols, and thus achieving higher data rates. Of course, the use of non-orthogonal pilots introduces additional pilot contamination, so the performance improvement could be achieved under certain system conditions, which are thoroughly investigated in this paper. We first provide a performance analysis framework for the uplink of cellular massive MIMO systems in which the effect of user pilot non-orthogonality has been analytically modelled. In this framework, we derive analytical expressions for the channel estimation, user Signal-to-Interference-plus-Noise-Ratio (SINR), and the average channel capacity per cell. We then use the proposed framework to evaluate the achievable spectral efficiency gain obtained by replacing orthogonal pilots with non-orthogonal counterparts. In particular, the existing trade-off between pilot lengths and the additional data symbols that can be transmitted by reducing the number of pilot symbols, is numerically quantified over a wide range of system parameters.
基于训练的蜂窝通信系统使用正交先导序列来限制先导污染。然而,正交性约束要求有一定的先导长度,因此在有大量用户的通信系统中,训练阶段会大量浪费时频资源。在蜂窝大规模多输入多输出系统中,用较短的非正交先导序列取代正交先导序列,可以更有效地利用时频资源,从而为传输额外的数据符号提供更多空间,实现更高的数据传输速率。当然,使用非正交先导会带来额外的先导污染,因此性能的提高需要在特定的系统条件下才能实现,本文将对这些条件进行深入研究。我们首先为蜂窝大规模 MIMO 系统的上行链路提供了一个性能分析框架,其中对用户先导非正交性的影响进行了分析建模。在这个框架中,我们得出了信道估计、用户信噪比(SINR)和每个小区平均信道容量的分析表达式。然后,我们利用所提出的框架来评估通过用非正交先导替换正交先导所获得的可实现的频谱效率增益。特别是,在广泛的系统参数范围内,我们用数字量化了先导长度与通过减少先导符号数量可传输的额外数据符号之间的现有权衡。
{"title":"An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems","authors":"Navid Pourjafari,&nbsp;Jalil Seifali Harsini","doi":"10.1016/j.dcan.2024.02.002","DOIUrl":"10.1016/j.dcan.2024.02.002","url":null,"abstract":"<div><div>Training-based cellular communication systems use orthogonal pilot sequences to limit pilot contamination. However, the orthogonality constraint imposes a certain pilot length, and therefore, in communication systems with a large number of users, time-frequency resources are wasted significantly in the training phase. In cellular massive MIMO systems, the time-frequency resources can be used more efficiently by replacing the orthogonal pilots with shorter non-orthogonal pilot sequences in such a way that more space is available for the transmission of additional data symbols, and thus achieving higher data rates. Of course, the use of non-orthogonal pilots introduces additional pilot contamination, so the performance improvement could be achieved under certain system conditions, which are thoroughly investigated in this paper. We first provide a performance analysis framework for the uplink of cellular massive MIMO systems in which the effect of user pilot non-orthogonality has been analytically modelled. In this framework, we derive analytical expressions for the channel estimation, user Signal-to-Interference-plus-Noise-Ratio (SINR), and the average channel capacity per cell. We then use the proposed framework to evaluate the achievable spectral efficiency gain obtained by replacing orthogonal pilots with non-orthogonal counterparts. In particular, the existing trade-off between pilot lengths and the additional data symbols that can be transmitted by reducing the number of pilot symbols, is numerically quantified over a wide range of system parameters.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1267-1279"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140470000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure double spectrum auction scheme 一个安全的双频谱拍卖方案
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2022.12.007
Jiaqi Wang , Ning Lu , Ziyang Gong , Wenbo Shi , Chang Choi
With the arrival of the 5G era, wireless communication technologies and services are rapidly exhausting the limited spectrum resources. Spectrum auctions came into being, which can effectively utilize spectrum resources. Because of the complexity of the electronic spectrum auction network environment, the security of spectrum auction can not be guaranteed. Most scholars focus on researching the security of the single-sided auctions, while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and buyers. Researchers begin to design the secure double spectrum auction mechanisms, in which two semi-honest agents are introduced to finish the spectrum auction rules. But these two agents may collude with each other or be bribed by buyers and sellers, which may create security risks, therefore, a secure double spectrum auction is proposed in this paper. Unlike traditional secure double spectrum auctions, the spectrum auction server with Software Guard Extensions (SGX) component is used in this paper, which is an Ethereum blockchain platform that performs spectrum auctions. A secure double spectrum protocol is also designed, using SGX technology and cryptographic tools such as Paillier cryptosystem, stealth address technology and one-time ring signatures to well protect the private information of spectrum auctions. In addition, the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification, and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum auctions. Finally, security analysis and performance evaluation of our protocol are discussed.
随着 5G 时代的到来,无线通信技术和服务正在迅速耗尽有限的频谱资源。能够有效利用频谱资源的频谱拍卖应运而生。由于电子频谱拍卖网络环境的复杂性,频谱拍卖的安全性无法得到保障。大多数学者专注于研究单边拍卖的安全性,而忽视了由多个卖方和买方组成的参与者的安全双频谱拍卖的实际场景。研究人员开始设计安全的双频谱拍卖机制,即引入两个半诚信的代理人来完成频谱拍卖规则。但这两个代理人可能相互串通或被买卖双方贿赂,从而产生安全隐患,因此本文提出了一种安全的双频谱拍卖。与传统的安全双频谱拍卖不同,本文使用了带有软件防护扩展(SGX)组件的频谱拍卖服务器,这是一个执行频谱拍卖的以太坊区块链平台。本文还设计了一个安全的双频谱协议,利用 SGX 技术和 Paillier 密码系统、隐身地址技术和一次性环签名等加密工具,很好地保护了频谱拍卖的隐私信息。此外,执行以太坊区块链平台提供的智能合约辅助离线验证,对重要的频谱拍卖信息进行验证,确保频谱拍卖的公平公正。最后,讨论了我们协议的安全性分析和性能评估。
{"title":"A secure double spectrum auction scheme","authors":"Jiaqi Wang ,&nbsp;Ning Lu ,&nbsp;Ziyang Gong ,&nbsp;Wenbo Shi ,&nbsp;Chang Choi","doi":"10.1016/j.dcan.2022.12.007","DOIUrl":"10.1016/j.dcan.2022.12.007","url":null,"abstract":"<div><div>With the arrival of the 5G era, wireless communication technologies and services are rapidly exhausting the limited spectrum resources. Spectrum auctions came into being, which can effectively utilize spectrum resources. Because of the complexity of the electronic spectrum auction network environment, the security of spectrum auction can not be guaranteed. Most scholars focus on researching the security of the single-sided auctions, while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and buyers. Researchers begin to design the secure double spectrum auction mechanisms, in which two semi-honest agents are introduced to finish the spectrum auction rules. But these two agents may collude with each other or be bribed by buyers and sellers, which may create security risks, therefore, a secure double spectrum auction is proposed in this paper. Unlike traditional secure double spectrum auctions, the spectrum auction server with Software Guard Extensions (SGX) component is used in this paper, which is an Ethereum blockchain platform that performs spectrum auctions. A secure double spectrum protocol is also designed, using SGX technology and cryptographic tools such as Paillier cryptosystem, stealth address technology and one-time ring signatures to well protect the private information of spectrum auctions. In addition, the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification, and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum auctions. Finally, security analysis and performance evaluation of our protocol are discussed.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1415-1427"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42368023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array 稀疏天线阵列毫米波NOMA系统中一种新的基于EO的最优随机波束形成方法
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.02.010
Fatemeh Asghari Azhiri , Behzad Mozaffari Tazehkand , Reza Abdolee
Millimeter-wave (mmWave) Non-Orthogonal Multiple Access (NOMA) with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations of mobile networks. In this paper, we introduce a cost-effective and energy-efficient mmWave-NOMA system that exploits sparse antenna arrays in the transmitter. Our analysis shows that utilizing low-weight and small-sized sparse antennas in the Base Station (BS) leads to better outage probability performance. We also introduce an optimum low complexity Equilibrium Optimization (EO)-based algorithm to further improve the outage probability. The simulation and analysis results show that the systems equipped with sparse antenna arrays making use of optimum beamforming vectors outperform the conventional systems with uniform linear arrays in terms of outage probability and sum rates.
毫米波(mmWave)非正交多址(NOMA)随机波束成形技术是一种很有前途的技术,可保证未来几代移动网络的大规模连接和低延迟传输。在本文中,我们介绍了一种具有成本效益和高能效的毫米波 NOMA 系统,该系统利用了发射器中的稀疏天线阵列。我们的分析表明,在基站(BS)中使用低重量、小尺寸的稀疏天线可带来更好的中断概率性能。我们还引入了一种基于均衡优化(EO)的最佳低复杂度算法,以进一步提高中断概率。仿真和分析结果表明,使用最佳波束成形向量的稀疏天线阵列系统在中断概率和总和速率方面优于使用均匀线性阵列的传统系统。
{"title":"A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array","authors":"Fatemeh Asghari Azhiri ,&nbsp;Behzad Mozaffari Tazehkand ,&nbsp;Reza Abdolee","doi":"10.1016/j.dcan.2023.02.010","DOIUrl":"10.1016/j.dcan.2023.02.010","url":null,"abstract":"<div><div>Millimeter-wave (mmWave) Non-Orthogonal Multiple Access (NOMA) with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations of mobile networks. In this paper, we introduce a cost-effective and energy-efficient mmWave-NOMA system that exploits sparse antenna arrays in the transmitter. Our analysis shows that utilizing low-weight and small-sized sparse antennas in the Base Station (BS) leads to better outage probability performance. We also introduce an optimum low complexity Equilibrium Optimization (EO)-based algorithm to further improve the outage probability. The simulation and analysis results show that the systems equipped with sparse antenna arrays making use of optimum beamforming vectors outperform the conventional systems with uniform linear arrays in terms of outage probability and sum rates.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1313-1321"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46246302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis for MU-MIMO enabled LTE-U networks coexisting with D2D and WiFi network 支持MU-MIMO的LTE-U网络与D2D和WiFi网络共存的性能分析
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.07.005
Errong Pei , Chenkai Ren , Wei Li , Qimei Chen , Bingguang Deng , Jiarui Song
LTE-Unlicensed (LTE-U) network is a type of cellular communication network operating the unlicensed spectrum. Offloading cellular traffic to WiFi or Device-to-Device (D2D) network can lead to interference among them. Applying Multiple-Input Multiple-Output (MIMO) technology in Cellular Base Station (CBS) and WiFi Access Point (WAP) can effectively reduce interference among D2D, WiFi and cellular networks. To our best knowledge, there is still no literature to explicitly study the characteristics of the traffic offloading in the Multiple-User MIMO (MU-MIMO) enabled network coexisting with D2D and WiFi networks. In this article, we thoroughly investigate the impact of D2D communication and MU-MIMO enabled WAP and CBS on the performance of the LTE-U network. More specifically, we derive the expressions of the downlink rates for cellular users, D2D users, and WiFi users with incomplete Channel State Information (CSI) feedback, and we validate our analysis through Monte-Carlo simulation. Numerous results illustrate the following conclusions. (i) Increasing the number of WiFi users, the length of CSI feedback, and the quantity of D2D pairs that reuse the channel with a single cellular user can increase the total throughput of the heterogeneous network. (ii) The total throughput decreases when more than two users are offloaded to D2D pairs, and increases as the number of offloaded users increases when less than six users are offloaded to WiFi network. (iii) Simultaneously offloading traffic to D2D pairs and WiFi network can obtain higher total throughput than offloading traffic to only one of them.
LTE-Unlicensed (LTE-U) 网络是一种使用非授权频谱的蜂窝通信网络。将蜂窝流量卸载到 WiFi 或设备到设备(D2D)网络会导致它们之间的干扰。在蜂窝基站(CBS)和 WiFi 接入点(WAP)中应用多输入多输出(MIMO)技术可有效减少 D2D、WiFi 和蜂窝网络之间的干扰。据我们所知,目前还没有文献明确研究多用户 MIMO(MU-MIMO)网络与 D2D 和 WiFi 网络共存时的流量卸载特性。在本文中,我们深入研究了 D2D 通信以及支持 MU-MIMO 的 WAP 和 CBS 对 LTE-U 网络性能的影响。更具体地说,我们推导了蜂窝用户、D2D 用户和 WiFi 用户在不完整信道状态信息(CSI)反馈下的下行链路速率表达式,并通过蒙特卡洛仿真验证了我们的分析。大量结果说明了以下结论。(i) 增加 WiFi 用户数量、CSI 反馈长度以及与单个蜂窝用户重用信道的 D2D 对数量,可提高异构网络的总吞吐量。(ii) 当超过两个用户被卸载到 D2D 对时,总吞吐量会下降;当少于六个用户被卸载到 WiFi 网络时,总吞吐量会随着卸载用户数量的增加而增加。(iii) 同时向 D2D 对和 WiFi 网络卸载流量比只向其中一个网络卸载流量能获得更高的总吞吐量。
{"title":"Performance analysis for MU-MIMO enabled LTE-U networks coexisting with D2D and WiFi network","authors":"Errong Pei ,&nbsp;Chenkai Ren ,&nbsp;Wei Li ,&nbsp;Qimei Chen ,&nbsp;Bingguang Deng ,&nbsp;Jiarui Song","doi":"10.1016/j.dcan.2023.07.005","DOIUrl":"10.1016/j.dcan.2023.07.005","url":null,"abstract":"<div><div>LTE-Unlicensed (LTE-U) network is a type of cellular communication network operating the unlicensed spectrum. Offloading cellular traffic to WiFi or Device-to-Device (D2D) network can lead to interference among them. Applying Multiple-Input Multiple-Output (MIMO) technology in Cellular Base Station (CBS) and WiFi Access Point (WAP) can effectively reduce interference among D2D, WiFi and cellular networks. To our best knowledge, there is still no literature to explicitly study the characteristics of the traffic offloading in the Multiple-User MIMO (MU-MIMO) enabled network coexisting with D2D and WiFi networks. In this article, we thoroughly investigate the impact of D2D communication and MU-MIMO enabled WAP and CBS on the performance of the LTE-U network. More specifically, we derive the expressions of the downlink rates for cellular users, D2D users, and WiFi users with incomplete Channel State Information (CSI) feedback, and we validate our analysis through Monte-Carlo simulation. Numerous results illustrate the following conclusions. (i) Increasing the number of WiFi users, the length of CSI feedback, and the quantity of D2D pairs that reuse the channel with a single cellular user can increase the total throughput of the heterogeneous network. (ii) The total throughput decreases when more than two users are offloaded to D2D pairs, and increases as the number of offloaded users increases when less than six users are offloaded to WiFi network. (iii) Simultaneously offloading traffic to D2D pairs and WiFi network can obtain higher total throughput than offloading traffic to only one of them.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1289-1296"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49333152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytical modeling of cache-enabled heterogeneous networks using Poisson cluster processes 使用Poisson聚类过程对支持缓存的异构网络进行分析建模
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.01.003
Junhui Zhao , Lihua Yang , Xiaoting Ma , Ziyang Zhang
The dual frequency Heterogeneous Network (HetNet), including sub-6 GHz networks together with Millimeter Wave (mmWave), achieves the high data rates of user in the networks with hotspots. The cache-enabled HetNets with hotspots are investigated using an analytical framework in which Macro Base Stations (MBSs) and hotspot centers are treated as two independent homogeneous Poisson Point Processes (PPPs), and locations of Small Base Stations (SBSs) and users are modeled as two Poisson Cluster Processes (PCPs). Under the PCP-based modeling method and the Most Popular Caching (MPC) scheme, we propose a cache-enabled association strategy for HetNets with limited storage capacity. The performance of association probability and coverage probability is explicitly derived, and Monte Carlo simulation is utilized to verify that the results are correct. The outcomes of the simulation present the influence of antenna configuration and cache capacities of MBSs and SBSs on network performance. Numerical optimization of the standard deviation ratio of SBSs and users of association probability is enabled by our analysis.
双频异构网络(HetNet),包括 6 GHz 以下网络和毫米波(mmWave),可在有热点的网络中实现用户的高数据传输速率。我们使用一个分析框架研究了具有热点的高速缓存支持的 HetNets,在该框架中,宏基站(MBS)和热点中心被视为两个独立的同质泊松点过程(PPP),而小基站(SBS)和用户的位置则被建模为两个泊松簇过程(PCP)。在基于 PCP 的建模方法和最受欢迎缓存(MPC)方案下,我们为存储容量有限的 HetNets 提出了一种缓存关联策略。我们明确推导出了关联概率和覆盖概率的性能,并利用蒙特卡罗仿真验证了结果的正确性。仿真结果表明了天线配置以及 MBS 和 SBS 的缓存容量对网络性能的影响。通过我们的分析,可以对 SBS 和用户关联概率的标准偏差比进行数值优化。
{"title":"Analytical modeling of cache-enabled heterogeneous networks using Poisson cluster processes","authors":"Junhui Zhao ,&nbsp;Lihua Yang ,&nbsp;Xiaoting Ma ,&nbsp;Ziyang Zhang","doi":"10.1016/j.dcan.2023.01.003","DOIUrl":"10.1016/j.dcan.2023.01.003","url":null,"abstract":"<div><div>The dual frequency Heterogeneous Network (HetNet), including sub-6 GHz networks together with Millimeter Wave (mmWave), achieves the high data rates of user in the networks with hotspots. The cache-enabled HetNets with hotspots are investigated using an analytical framework in which Macro Base Stations (MBSs) and hotspot centers are treated as two independent homogeneous Poisson Point Processes (PPPs), and locations of Small Base Stations (SBSs) and users are modeled as two Poisson Cluster Processes (PCPs). Under the PCP-based modeling method and the Most Popular Caching (MPC) scheme, we propose a cache-enabled association strategy for HetNets with limited storage capacity. The performance of association probability and coverage probability is explicitly derived, and Monte Carlo simulation is utilized to verify that the results are correct. The outcomes of the simulation present the influence of antenna configuration and cache capacities of MBSs and SBSs on network performance. Numerical optimization of the standard deviation ratio of SBSs and users of association probability is enabled by our analysis.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1439-1447"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46573455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Index modulation aided generalized space-time block coding: A unified MIMO framework 索引调制辅助广义空时分组编码:一种统一的MIMO框架
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.02.008
Zhiqin Wang , Hui Liu , Lixia Xiao , Liuke Li , Guochao Song , Tao Jiang
In this paper, Index Modulation (IM) aided Generalized Space-Time Block Coding (GSTBC) is proposed, which intrinsically exploits the benefits of IM concept, diversity gain and spatial multiplexing gain. Specifically, the information bits are partitioned into U groups, with each being modulated by IM symbols (i.e. Spatial Modulation (SM), Quadrature SM (QSM),etc). Next, the structure of GSTBC is invoked for each K IM symbol, and a total of μ ​= ​U/K GSTBC codes are transmitted via T time slots. A Block Expectation Propagation (B-EP) detector is designed for the proposed IM-GSTBC structure. Moreover, the theoretical Average Bit Error Probability (ABEP) is derived for our IM-GSTBC system, which is confirmed by the simulation results and helpful for performance evaluation. Simulation results show that our proposed IM-GSTBC system is capable of striking an efficient trade-off between spatial multiplexing gain, spatial diversity gain as well as implementation cost imposed for both small-scale and large-scale MIMO antenna configurations.
本文提出了索引调制(IM)辅助广义时空块编码(GSTBC),它从本质上利用了 IM 概念、分集增益和空间复用增益的优点。具体来说,信息比特被分成 U 组,每组由 IM 符号(即空间调制 (SM)、正交 SM (QSM) 等)调制。然后,对每 K 个 IM 符号调用 GSTBC 结构,通过 T 个时隙传输总共 μ = U/K 个 GSTBC 编码。针对所提出的 IM-GSTBC 结构,设计了一个块期望传播(B-EP)检测器。此外,我们还推导出了 IM-GSTBC 系统的理论平均比特误差概率(ABEP),仿真结果证实了这一点,并有助于进行性能评估。仿真结果表明,我们提出的 IM-GSTBC 系统能够在空间复用增益、空间分集增益以及小规模和大规模 MIMO 天线配置的实施成本之间实现有效权衡。
{"title":"Index modulation aided generalized space-time block coding: A unified MIMO framework","authors":"Zhiqin Wang ,&nbsp;Hui Liu ,&nbsp;Lixia Xiao ,&nbsp;Liuke Li ,&nbsp;Guochao Song ,&nbsp;Tao Jiang","doi":"10.1016/j.dcan.2023.02.008","DOIUrl":"10.1016/j.dcan.2023.02.008","url":null,"abstract":"<div><div>In this paper, Index Modulation (IM) aided Generalized Space-Time Block Coding (GSTBC) is proposed, which intrinsically exploits the benefits of IM concept, diversity gain and spatial multiplexing gain. Specifically, the information bits are partitioned into <em>U</em> groups, with each being modulated by IM symbols (i.e. Spatial Modulation (SM), Quadrature SM (QSM),etc). Next, the structure of GSTBC is invoked for each <em>K</em> IM symbol, and a total of <em>μ</em> ​= ​<em>U</em>/<em>K</em> GSTBC codes are transmitted via <em>T</em> time slots. A Block Expectation Propagation (B-EP) detector is designed for the proposed IM-GSTBC structure. Moreover, the theoretical Average Bit Error Probability (ABEP) is derived for our IM-GSTBC system, which is confirmed by the simulation results and helpful for performance evaluation. Simulation results show that our proposed IM-GSTBC system is capable of striking an efficient trade-off between spatial multiplexing gain, spatial diversity gain as well as implementation cost imposed for both small-scale and large-scale MIMO antenna configurations.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1459-1470"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42649593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic adversarial jamming-based reinforcement learning for designing constellations 基于动态对抗干扰的星座设计强化学习
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.05.012
Yizhou Xu , Haidong Xie , Nan Ji , Yuanqing Chen , Naijin Liu , Xueshuang Xiang
To resist various types of jamming in wireless channels, appropriate constellation modulation is used in wireless communication to ensure a low bit error rate. Due to the complexity and variability of the channel environment, a simple preset constellation is difficult to adapt to all scenarios, so the online constellation optimization method based on Reinforcement Learning (RL) shows its potential. However, the existing RL technology is difficult to ensure the optimal convergence efficiency. Therefore, in this paper, Dynamic Adversarial Interference (DAJ) waveforms are introduced and the DAJ-RL method is proposed by referring to adversarial training in Deep Learning (DL). The algorithm can converge to the optimal state quickly by self-adaptive power and probability direction of dynamic strong adversary of DAJ. In this paper, a rigorous theoretical proof of the symbol error rate is given and it is shown that the method approaches the mathematical limit. Also, numerical and hardware experiments show that the constellations generated by DAJ-RL have the best error rate at all noise levels. In the end, the proposed DAJ-RL method effectively improves the RL-based anti-jamming modulation for cognitive electronic warfare.
为了抵御无线信道中的各种干扰,无线通信中使用了适当的星座调制来确保低误码率。由于信道环境的复杂性和多变性,简单的预设星座很难适应所有场景,因此基于强化学习(RL)的在线星座优化方法显示出其潜力。然而,现有的 RL 技术很难保证最佳收敛效率。因此,本文引入了动态对抗干扰(DAJ)波形,并参考深度学习(DL)中的对抗训练,提出了 DAJ-RL 方法。该算法通过DAJ动态强对抗的自适应功率和概率方向,可以快速收敛到最优状态。本文给出了符号错误率的严格理论证明,并表明该方法接近数学极限。同时,数值和硬件实验表明,DAJ-RL 生成的星座在所有噪声水平下都具有最佳误码率。最后,所提出的 DAJ-RL 方法有效地改进了认知电子战中基于 RL 的抗干扰调制。
{"title":"Dynamic adversarial jamming-based reinforcement learning for designing constellations","authors":"Yizhou Xu ,&nbsp;Haidong Xie ,&nbsp;Nan Ji ,&nbsp;Yuanqing Chen ,&nbsp;Naijin Liu ,&nbsp;Xueshuang Xiang","doi":"10.1016/j.dcan.2023.05.012","DOIUrl":"10.1016/j.dcan.2023.05.012","url":null,"abstract":"<div><div>To resist various types of jamming in wireless channels, appropriate constellation modulation is used in wireless communication to ensure a low bit error rate. Due to the complexity and variability of the channel environment, a simple preset constellation is difficult to adapt to all scenarios, so the online constellation optimization method based on Reinforcement Learning (RL) shows its potential. However, the existing RL technology is difficult to ensure the optimal convergence efficiency. Therefore, in this paper, Dynamic Adversarial Interference (DAJ) waveforms are introduced and the DAJ-RL method is proposed by referring to adversarial training in Deep Learning (DL). The algorithm can converge to the optimal state quickly by self-adaptive power and probability direction of dynamic strong adversary of DAJ. In this paper, a rigorous theoretical proof of the symbol error rate is given and it is shown that the method approaches the mathematical limit. Also, numerical and hardware experiments show that the constellations generated by DAJ-RL have the best error rate at all noise levels. In the end, the proposed DAJ-RL method effectively improves the RL-based anti-jamming modulation for cognitive electronic warfare.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1471-1479"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42125794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles 评估远程访问网络攻击对联网自动化车辆变道的影响
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.06.004
Changyin Dong , Yujia Chen , Hao Wang , Leizhen Wang , Ye Li , Daiheng Ni , De Zhao , Xuedong Hua
Connected automated vehicles (CAVs) rely heavily on intelligent algorithms and remote sensors. If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication, it can cause significant damage to CAVs or passengers. The primary objective of this study is to model cyber-attacked traffic flow and evaluate the impacts of cyber-attack on the traffic system filled with CAVs in a connected environment. Based on the analysis on environmental perception system and possible cyber-attacks on sensors, a novel lane-changing model for CAVs is proposed and multiple traffic scenarios for cyber-attacks are designed. The impact of the proportion of cyber-attacked vehicles and the severity of the cyber-attack on the lane-changing process is then quantitatively analyzed. The evaluation indexes include spatio-temporal evolution of average speed, spatial distribution of selected lane-changing gaps, lane-changing rate distribution, lane-changing preparation search time, efficiency and safety. Finally, the numerical simulation results show that the freeway traffic near an off-ramp is more sensitive to the proportion of cyber-attacked vehicles than to the severity of the cyber-attack. Also, when the traffic system is under cyber-attack, more unsafe back gaps are chosen for lane-changing, especially in the center lane. Therefore, more lane-changing maneuvers are concentrated on approaching the off-ramp, causing severe congestions and potential rear-end collisions. In addition, as the number of cyber-attacked vehicles and the severity of cyber-attacks increase, the road capacity and safety level will rapidly decrease. The results of this study can provide a theoretical basis for accident avoidance and efficiency improvement for the design of CAVs and management of automated highway systems.
互联自动驾驶汽车(CAV)在很大程度上依赖于智能算法和远程传感器。如果控制中心或车载传感器因无线通信的安全漏洞而受到网络攻击,就会对 CAV 或乘客造成重大损害。本研究的主要目的是建立受网络攻击的交通流模型,并评估网络攻击对互联环境中充满 CAV 的交通系统的影响。在分析环境感知系统和传感器可能受到的网络攻击的基础上,提出了一种新颖的 CAV 变道模型,并设计了多种网络攻击的交通场景。然后定量分析了网络攻击车辆比例和网络攻击严重程度对变道过程的影响。评价指标包括平均车速的时空变化、所选变道间隙的空间分布、变道率分布、变道准备搜索时间、效率和安全性。最后,数值模拟结果表明,匝道附近的高速公路交通对网络攻击车辆的比例比对网络攻击的严重程度更敏感。此外,当交通系统受到网络攻击时,会选择更多不安全的后间隙进行变道,尤其是在中央车道。因此,更多的变道操作集中在接近下匝道时,造成严重拥堵和潜在的追尾碰撞。此外,随着网络攻击车辆数量和网络攻击严重程度的增加,道路通行能力和安全水平将迅速下降。本研究的结果可为 CAV 的设计和自动高速公路系统的管理提供避免事故和提高效率的理论依据。
{"title":"Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles","authors":"Changyin Dong ,&nbsp;Yujia Chen ,&nbsp;Hao Wang ,&nbsp;Leizhen Wang ,&nbsp;Ye Li ,&nbsp;Daiheng Ni ,&nbsp;De Zhao ,&nbsp;Xuedong Hua","doi":"10.1016/j.dcan.2023.06.004","DOIUrl":"10.1016/j.dcan.2023.06.004","url":null,"abstract":"<div><div>Connected automated vehicles (CAVs) rely heavily on intelligent algorithms and remote sensors. If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication, it can cause significant damage to CAVs or passengers. The primary objective of this study is to model cyber-attacked traffic flow and evaluate the impacts of cyber-attack on the traffic system filled with CAVs in a connected environment. Based on the analysis on environmental perception system and possible cyber-attacks on sensors, a novel lane-changing model for CAVs is proposed and multiple traffic scenarios for cyber-attacks are designed. The impact of the proportion of cyber-attacked vehicles and the severity of the cyber-attack on the lane-changing process is then quantitatively analyzed. The evaluation indexes include spatio-temporal evolution of average speed, spatial distribution of selected lane-changing gaps, lane-changing rate distribution, lane-changing preparation search time, efficiency and safety. Finally, the numerical simulation results show that the freeway traffic near an off-ramp is more sensitive to the proportion of cyber-attacked vehicles than to the severity of the cyber-attack. Also, when the traffic system is under cyber-attack, more unsafe back gaps are chosen for lane-changing, especially in the center lane. Therefore, more lane-changing maneuvers are concentrated on approaching the off-ramp, causing severe congestions and potential rear-end collisions. In addition, as the number of cyber-attacked vehicles and the severity of cyber-attacks increase, the road capacity and safety level will rapidly decrease. The results of this study can provide a theoretical basis for accident avoidance and efficiency improvement for the design of CAVs and management of automated highway systems.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1480-1492"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43962154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1